The Barbarino Test for Actionable Plans
Vinny Barbarino was a likeable character on a 1970s sitcom called Welcome Back Kotter. Welcome Back Kotter featured Gabe Kaplan as a Brooklyn school teacher charged with the education of some very uni...
Vinny Barbarino was a likeable character on a 1970s sitcom called Welcome Back Kotter. Welcome Back Kotter featured Gabe Kaplan as a Brooklyn school teacher charged with the education of some very uni...
Organizations often make a false assumption as they approach the start of a Business Impact Analysis (BIA) or recovery plan building: they assume that staff members can define the business processes t...
Disaster Recovery planning can be painstaking. There are so many nuanced areas of focus that it is easy to miss key information that could hinder or block restoring systems and data within the time fr...
The Network Effect is the idea that a product or service increases in value as more people utilize it. This is a key concept underlying the rise of the Network Economy. In the Network Economy the numb...
Breaking up is hard to do. Those are not my words. They were said, or sang by a much more talented guy named Neal Sedaka. He sang those lyrics back in 1976, but they are still true today. Breaking up ...
Here's a new concept on how to utilize your security ratings solution, like Bitsight, to help you reduce your own security risk. Many organizations are struggling with running a Third Party Risk Manag...
Calculating the value that ServiceNow can provide your organization can be complex when so many factors are involved. That's why we provide helpful tools and services, like a value calculator, to help...
What happened? Most of you are familiar with the twice-yearly family releases of the ServiceNow platform and applications. As you can imagine we’re constantly improving the process and finding alterna...
Cyber Exposure is an emerging discipline for managing and measuring cybersecurity risk in the digital era. It transforms security and risk from a static and siloed state to one that is dynamic and hol...
All organizations are required to comply with more mandates because of the increasing number of laws, government regulations, contractual obligations, and national and international standards. Accordi...
With an increased dependency on third-parties in today’s age of digital transformation, understanding the cyber risk and compliance posture of enterprise vendors has never been more critical to your o...
For far too long, cybersecurity leaders have struggled to translate cyber risk into the economic language of business. They’ve been lost trying to protect the business without any concrete understandi...
Imagine the ability to see your enterprise risks in financial terms, trended over time, and based on the impact to your business. You’d then be able to identify when you’re above your risk threshold a...
Did you know that a breach that includes a third party will cost you 12% more1 than if it did not include a third party – almost $4 million? But it's not just the risk of a breach, anyone familiar wit...